URL: | https://can01.safelinks.protection.outlook.com/?url=https%253A%252F%252Faddto.password.land%252FXVVJrTFBnYlZjSkdGekovK0NqbHc5bElvUGdyRnhMR2poK2NNckl0UjZaN1JVTnJkaHBTbWluVW5rcEd5NCtYUkVCWUl6dDBIN2pLSXRqdThEOHdDRk53dE5KTFc0Y0hhM2F5K0JJbkdqN0kvNlV6VUJWa05yV21pRGFMa2xnYmFoNTdDZEsxM0QzTElXb2d4MUZTSDFHUGZOenROM1BKMnhxTHZwMHowV0w0SGx5VmdaSWRYdm5YZi0tWE9xVHo1VWdiVTJQaEtEZC0tWk1PSWU2ZlBKUVFBMEQvTUJHRko2dz09%253Fcid%253D2592073359&data=05%257C02%257Cvc3%2540waypoint.ca%257Ca6f9bd0310b5483b83fd08ddbbe7c6ae%257C30c3fb354ca9474585c758aaffc3cab2%257C0%257C0%257C638873326353153312%257CUnknown%257CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%253D%253D%257C0%257C%257C%257C&sdata=uW5gKKBqqY3GVOVuQaffw1N8SAXH2cId5QDFKOgU2h8%253D&reserved=0 |
Full analysis: | https://app.any.run/tasks/94c3edf2-a357-4592-ba13-0cb4528ba563 |
Verdict: | Malicious activity |
Analysis date: | July 05, 2025, 21:55:35 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MD5: | 6CACD25D82B6D52A2F859D461486418D |
SHA1: | 1D3FC43321281B943B8142D02EA3EF8289ABA5F5 |
SHA256: | C2BC6844575FBCD8223E5227DBB79BD816DB3C5F8442A45EE3CD9ADB16C1D097 |
SSDEEP: | 12:2G9qfJX4ygRPumvgjFy+plAz/XlDgkfv+0X6fFbVTFNqJDG9lXZD69g:2aqNmRmEOqz/XJ+0XCVRNqJWX89g |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
5012 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --webtransport-developer-mode --string-annotations --always-read-main-dll --field-trial-handle=2180,i,6161488519127897921,10116046693238162506,262144 --variations-seed-version --mojo-platform-channel-handle=2512 /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 133.0.3065.92 |
PID | Process | Filename | Type | |
---|---|---|---|---|
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b7 | compressed | |
MD5:CF0A5FD70F529FE5882B21BFB94BBA13 | SHA256:D0EDE86D4B33FC0DEE9E405678EED6B7F57D88CA734C5FF196C5ED046192CF6C | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\f513ed59-0467-4367-a7e5-e7f4d714bb8e.tmp | binary | |
MD5:F054A7D6E382DF24018FE84986B710A2 | SHA256:4E5235C6B40BCE6C5FD0554D554FCDB38E8016DCDDFA9CAB63103407CAF8DAEB | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b9 | compressed | |
MD5:CF0A5FD70F529FE5882B21BFB94BBA13 | SHA256:D0EDE86D4B33FC0DEE9E405678EED6B7F57D88CA734C5FF196C5ED046192CF6C | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:F054A7D6E382DF24018FE84986B710A2 | SHA256:4E5235C6B40BCE6C5FD0554D554FCDB38E8016DCDDFA9CAB63103407CAF8DAEB | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RFc7082.TMP | binary | |
MD5:8CA6AC4CD0D4F8B2EA5A9FC6FD4311D7 | SHA256:EE810A451AEA499C3D6F89EDB840ED025DF0937874485A211A3BB39F915F4EA0 | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b8 | compressed | |
MD5:4E57002D62ECEB6A5F033BFA4907358D | SHA256:10933D5F27D05B9BAD2576A92D2F0A4E8C6D34DFBC965A350D0CDEE4D8D8B035 | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b6 | html | |
MD5:D8798AAE777F6C93C53155F081A8C8EA | SHA256:69FEB31D20F8340079383EB02BD89606E55D53476E2C1A9D70646E3A19FE4A25 | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000ba | compressed | |
MD5:4E57002D62ECEB6A5F033BFA4907358D | SHA256:10933D5F27D05B9BAD2576A92D2F0A4E8C6D34DFBC965A350D0CDEE4D8D8B035 | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bb | compressed | |
MD5:35B5D9F676749FBB797019B9540174F5 | SHA256:AE96909DB92D89724804DABFD870B8B62D7BDA8E02B7327FE835ECF97097D5F3 | |||
5012 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b5 | binary | |
MD5:ED814DB680DCE5BAF71A913825117042 | SHA256:051874E37194F6573CDF2FEB40D67E698ECF39B52648E39F6AAC62E0C4D547AE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 302 | 52.102.113.47:443 | https://can01.safelinks.protection.outlook.com/?url=https%253A%252F%252Faddto.password.land%252FXVVJrTFBnYlZjSkdGekovK0NqbHc5bElvUGdyRnhMR2poK2NNckl0UjZaN1JVTnJkaHBTbWluVW5rcEd5NCtYUkVCWUl6dDBIN2pLSXRqdThEOHdDRk53dE5KTFc0Y0hhM2F5K0JJbkdqN0kvNlV6VUJWa05yV21pRGFMa2xnYmFoNTdDZEsxM0QzTElXb2d4MUZTSDFHUGZOenROM1BKMnhxTHZwMHowV0w0SGx5VmdaSWRYdm5YZi0tWE9xVHo1VWdiVTJQaEtEZC0tWk1PSWU2ZlBKUVFBMEQvTUJHRko2dz09%253Fcid%253D2592073359&data=05%257C02%257Cvc3%2540waypoint.ca%257Ca6f9bd0310b5483b83fd08ddbbe7c6ae%257C30c3fb354ca9474585c758aaffc3cab2%257C0%257C0%257C638873326353153312%257CUnknown%257CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%253D%253D%257C0%257C%257C%257C&sdata=uW5gKKBqqY3GVOVuQaffw1N8SAXH2cId5QDFKOgU2h8%253D&reserved=0 | unknown | html | 465 b | whitelisted |
— | — | HEAD | 403 | 199.232.210.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/4c4fdee0-d69c-42b7-bf5c-3ec046e9dfc9?P1=1751247403&P2=404&P3=2&P4=KIOuyaltQzGUv9%2fRXevwe%2b%2fSXHyfYvf%2f5L%2fb6O%2fEjuA9bg7JGUT71DQcxatSu%2by%2f0Fb5ScE2gwu8%2bMYnHtBQiQ%3d%3d | unknown | — | — | whitelisted |
— | — | HEAD | 200 | 23.197.142.186:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
— | — | GET | 200 | 23.197.142.186:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | binary | 55 b | whitelisted |
1080 | svchost.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 18.173.205.50:443 | https://addto.password.land/XVVJrTFBnYlZjSkdGekovK0NqbHc5bElvUGdyRnhMR2poK2NNckl0UjZaN1JVTnJkaHBTbWluVW5rcEd5NCtYUkVCWUl6dDBIN2pLSXRqdThEOHdDRk53dE5KTFc0Y0hhM2F5K0JJbkdqN0kvNlV6VUJWa05yV21pRGFMa2xnYmFoNTdDZEsxM0QzTElXb2d4MUZTSDFHUGZOenROM1BKMnhxTHZwMHowV0w0SGx5VmdaSWRYdm5YZi0tWE9xVHo1VWdiVTJQaEtEZC0tWk1PSWU2ZlBKUVFBMEQvTUJHRko2dz09?cid=2592073359 | unknown | html | 452 b | — |
— | — | POST | 200 | 150.171.28.11:443 | https://edge.microsoft.com/componentupdater/api/v1/update | unknown | text | 1.48 Kb | whitelisted |
4296 | RUXIMICS.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5012 | msedge.exe | GET | 403 | 199.232.210.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/4c4fdee0-d69c-42b7-bf5c-3ec046e9dfc9?P1=1751247403&P2=404&P3=2&P4=KIOuyaltQzGUv9%2fRXevwe%2b%2fSXHyfYvf%2f5L%2fb6O%2fEjuA9bg7JGUT71DQcxatSu%2by%2f0Fb5ScE2gwu8%2bMYnHtBQiQ%3d%3d | unknown | — | — | whitelisted |
5336 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4296 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5336 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1080 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 199.232.210.172:80 | msedge.b.tlu.dl.delivery.mp.microsoft.com | FASTLY | US | whitelisted |
4900 | svchost.exe | 23.197.142.186:443 | fs.microsoft.com | Akamai International B.V. | US | whitelisted |
5012 | msedge.exe | 52.102.113.47:443 | can01.safelinks.protection.outlook.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1080 | svchost.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4296 | RUXIMICS.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5012 | msedge.exe | 3.229.81.136:443 | addto.password.land | AMAZON-AES | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
msedge.b.tlu.dl.delivery.mp.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
fs.microsoft.com |
| whitelisted |
can01.safelinks.protection.outlook.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
addto.password.land |
| unknown |
www.microsoft.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
secured-login.net |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Successful Credential Theft Detected | ET INFO Observed DNS Query to KnowBe4 Simulated Phish Domain |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] KnowBe4: Security Awareness Training (secured-login. net) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] KnowBe4: Security Awareness Training (secured-login. net) |
— | — | Successful Credential Theft Detected | ET INFO Observed KnowBe4/Popcorn Training Simulated Phish Landing Page M2 |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] KnowBe4: Security Awareness Training (knowbe4 .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] KnowBe4: Security Awareness Training (knowbe4 .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Training domain ( .knowbe4 .) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Training domain ( .knowbe4 .) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Global content delivery network (unpkg .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] KnowBe4: Security Awareness Training (knowbe4 .com) |